Malware creators often use porn applications to spread malicious code across users’ mobile and desktop devices. Often, Google Play is also included in such scenarios, in which click-jacking mobile malware is used to make quick income for affiliates. The operating system mostly affected by these schemes is Android.
Porn Clicker Silently Takes Over Users’ Devices
That being sad, researchers from ESET have run into an interesting piece of malicious code, a Trojan, that doesn’t collect private information or download malware to the compromised Android devices. Instead, Porn Clicker, as researchers dubbed the threat, clicks on advertisements featured on porn websites without the user’s approval or knowledge. In other words, Porn Clicker is indeed a click-jacking mobile threat that is operating surreptitiously.
Mobile Threats: Acerard Banking Trojan
Porn Clicker pretends to be a popular mobile application in Google Play, be it Candy Crush, GTA, Subway Surfers, etc. To avoid downloading suspicious applications, the user should always look for the signs. Such apps usually have a number of negative reviews. Unfortunately, crooks know that, and repackage the malware over and over again.
That is why another must-do inspection for the user is carefully checking the app’s developer. Is it legitimate, or does it look suspicious and untrustworthy?
Third-party Stores Also Used to Spread Porn Clicker
Furthermore, researchers believe that Trojans such as this particular Porn Clicker can go unnoticed for a long time simply because they feature implemented antivirus checks. After installation and before running on the device, the Trojan performs a check for the presence of a range list of widely used mobile security apps. If such is found, the Trojan won’t be triggered.
In addition, researchers say that not all of the malicious apps were hosted on Google Play, and that third-party stores were likely used. 187 applications, associated with the Porn Clicker, were discovered aside from the ones featured on Google Play.